Browse Publications Technical Papers 2013-01-1418
2013-04-08

Secure Key Management - A Key Feature for Modern Vehicle Electronics 2013-01-1418

The need for vehicular data security and privacy protection is already enormous and increases even further. Prominent application areas are for instance theft protection, anti-counterfeiting, secure data storage and secure communication inside the vehicle and from the vehicle to the outside world. However, most of the vehicular security and privacy protection solutions involve modern cryptography and require availability of cryptographic keys in the vehicle and in related backend infrastructure. A central aspect for ensuring this availability and a controlled usage of such cryptographic keys is a secure key management, which affects the whole lifecycle of the key, from creation and distribution, usage, backup and update up to key deactivation. Even though secure key management is quite well understood in the standard computer world, the situation in the automotive world is quite different, as we have different functional requirements (e.g., sporadic low-bandwidth connections) and different security requirements (e.g., physical insider attacks).
We hence analyze the requirements and give best practice approaches for a secure key management solution in the automotive context. We highlight potential security concerns that are encountered during each phase on a lifecycle of a cryptographic key used in a typical vehicular security solution. Knowing the security vulnerabilities, we will introduce open solutions and best practice approaches for secure key management implementation both in the embedded in-vehicle domain as well as for the supporting backend infrastructure.

SAE MOBILUS

Subscribers can view annotate, and download all of SAE's content. Learn More »

Access SAE MOBILUS »

Members save up to 18% off list price.
Login to see discount.
Special Offer: Download multiple Technical Papers each year? TechSelect is a cost-effective subscription option to select and download 12-100 full-text Technical Papers per year. Find more information here.
We also recommend:
JOURNAL ARTICLE

Model-based Application of ISO 26262: The Hazard Analysis and Risk Assessment

2013-01-0184

View Details

TECHNICAL PAPER

Investigation of Vehicular Networks and its Main Security Issues

2014-01-0336

View Details

TECHNICAL PAPER

Securing Connected Vehicles End to End

2014-01-0300

View Details

X